General
-
Target
d0ebe35a902832fbd856e5a03d770c5cf1d7ba9c9418a51bda6d9b0698771841N.exe
-
Size
120KB
-
Sample
250216-nbspxatlfm
-
MD5
c6ddc5c9dad56fd85bf6199b38c09120
-
SHA1
299bc508a4c1a603789b7c5aa166713b3428f2e0
-
SHA256
d0ebe35a902832fbd856e5a03d770c5cf1d7ba9c9418a51bda6d9b0698771841
-
SHA512
41668f9c2231769aa8c919166b964d0161b2cde4c0efd175b5f3bdb25906496ed045366fb1c25439663e98f483f43bc4e56fa4891abd3cd5abb3bbbfdcf69e40
-
SSDEEP
3072:FEFRh0auCcJVwDjwzTC2SCn/FtVQenIuxIGWsnRR9pLTfQvXeD:W3h0aMJ+Hw3Pgen79/IvO
Behavioral task
behavioral1
Sample
d0ebe35a902832fbd856e5a03d770c5cf1d7ba9c9418a51bda6d9b0698771841N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0ebe35a902832fbd856e5a03d770c5cf1d7ba9c9418a51bda6d9b0698771841N.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
vidar
https://t.me/b4cha00
https://steamcommunity.com/profiles/76561199825403037
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0
Targets
-
-
Target
d0ebe35a902832fbd856e5a03d770c5cf1d7ba9c9418a51bda6d9b0698771841N.exe
-
Size
120KB
-
MD5
c6ddc5c9dad56fd85bf6199b38c09120
-
SHA1
299bc508a4c1a603789b7c5aa166713b3428f2e0
-
SHA256
d0ebe35a902832fbd856e5a03d770c5cf1d7ba9c9418a51bda6d9b0698771841
-
SHA512
41668f9c2231769aa8c919166b964d0161b2cde4c0efd175b5f3bdb25906496ed045366fb1c25439663e98f483f43bc4e56fa4891abd3cd5abb3bbbfdcf69e40
-
SSDEEP
3072:FEFRh0auCcJVwDjwzTC2SCn/FtVQenIuxIGWsnRR9pLTfQvXeD:W3h0aMJ+Hw3Pgen79/IvO
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4